White Paper The Return on Investment of Automated Patch Management

Size: px
Start display at page:

Download "White Paper The Return on Investment of Automated Patch Management"

Transcription

1 White Paper The Return on Investment of Automated Patch Management July 2006

2 Introduction It s a simple truth: applying patches is the only definitive way to keep vulnerable systems from being exploited. Accordingly, the vast majority of organizations acknowledge the need to have a formal patch management strategy and solution. Furthermore they clearly recognize that the demands in this area are escalating due to the proliferation of new vulnerabilities and the rapid emergence of associated threats. Seemingly irreversible conditions require that organizations not only deploy more patches than ever before, but also that they do so with a much greater degree of urgency. Figure 1: A Perfect Storm for Information Security Given this situation, it intuitively makes sense to implement an automated patch management solution. However, IT and security personnel inevitably need to provide more than just their intuition to justify such an investment. This paper is intended to address this necessity by enumerating the cost savings and other associated benefits of automated patch management. Ultimately it will be demonstrated that, relative to a manual approach, an automated solution can reduce the annual cost of patching from $222 to $40 per computer resulting in an expected savings of over $180,000 per year for an organization with 1000 computers. Cost/Savings and Benefits Analysis There are many factors and dependencies associated with an analysis of the benefits of automated patch management not all of which are straightforward. The assumptions, choices, and rationale provided in the following sections are based on the experience of the authors, the expertise of the developers and engineers at PatchLink, and the continuous feedback collected from PatchLink s extensive customer base. Page - 1

3 Overview of Benefits The benefits of automated patch management can be assigned to two general categories: quantitative and qualitative. The primary distinction between these is whether reasonably defendable estimates can be calculated for the given benefit. The most significant quantifiable benefit is the reduction in administrator effort that results from automating many portions of an otherwise manually intensive exercise. Understanding this further is facilitated by Figure 2, which provides a summary of the individual tasks that comprise the major steps of a typical patch management process. To be clear, the benefit here is one of achieving greater efficiency of operations. It could also be argued that administrator and end-user productivity gains due to incurring fewer successful attacks deserve to be classified as quantifiable benefits. However, it is probably more appropriate to classify these as red herrings. The problem in this case is that the potential gains hinge on the anticipation of remediating a vulnerability much sooner than would otherwise be possible (which is fundamentally different than doing it more efficiently). But there are several challenges with this notion. First, the presence of intermediate steps in the process which are necessarily manual diminishes the potential improvement in the overall elapsed time before a patch is applied and, more importantly, complicates its quantification. The second challenge is assigning a value to whatever degree of improvement is actually attained. By how many will the number of successful attacks actually be reduced? One can only guess. Finally, there is the point that taking advantage of any gain in this area requires the patch management process to be executed more frequently. In the extreme, it would need to be conducted every time a patch became available as opposed to the widely favored approach of executing it at regularly scheduled intervals (e.g., monthly). Overall, it is expected that the cost of these extra cycles (i.e., rollouts) would offset the productivity savings attributable to experiencing a few less successful attacks. In any event, this potential benefit is simply too difficult to defend concretely and, therefore, is relegated to the qualitative category. It is important to realize, however, that just because it is not easily quantified does not mean that the ability to remediate vulnerabilities sooner, at least in some cases, is not a valid benefit. In reality, it can and does save organizations from successful attacks. It s just that the actual number of such occurrences is irregular and highly unpredictable. Instead, the real value in this case is a general level of risk reduction that yields a range of qualitative benefits, such as the reduced likelihood of: Loss of data; Loss of revenue; Loss of credibility with customers and partners; and, Legal action/liability. Furthermore, the potential magnitude of these benefits is so great that productivity gains due to fewer user disruptions and reduced recovery efforts, whatever they may be, become relatively meaningless. Indeed, it is well documented that even a single successful attack could lead to intangible Page - 2

4 losses of millions of dollars, particularly if the incident receives any degree of public exposure and attention. Description of Scenario As intuitively helpful as large-magnitude qualitative benefits can be, they simply do not have the same motivational impact as cold-hard data, especially if it s in the form of dollars. With this in mind, a cost model comparing manual and automated approaches of executing the patch management process is provided in Table 1. Although this model is essentially generic, and therefore adaptable to the situation at virtually any organization, the specific scenario for which the calculations were made in this case is defined by the following high-level characteristics. There are 1000 end-user computing stations split among two sufficiently different builds (i.e., combinations of hardware, operating system, and applications) such that certain tasks must be performed independently for each group. There is a moderate level of heterogeneity, with operating systems and applications from multiple vendors. This leads to a total number of applicable patches that corresponds to twice the annual average of patches encountered by the typical Microsoft-only shop (i.e., 2*160). However, risk analysis and shrewd planning result in the need to only deploy three quarters of this number (i.e., 240). The organization prefers to aggregate its patches and deploy them at regularly scheduled intervals (i.e., monthly), but will conduct additional, off-cycle rollouts to account for critical situations (i.e., 2 per year). It should also be emphasized that estimates, where needed to supplement real-world data, were made in a conservative manner (i.e., in favor of the manual approach). As a result, the actual cost advantage that any given organization derives from automated patch management is likely to be somewhat greater than what the model predicts. Examination of Findings Speaking of cost advantages, the outcome for the given scenario is that, due to a per-computer reduction in patch management costs from $222 to $40 per year, an automated patch management solution is projected to yield an annual savings of approximately $182,000. In other words, without even accounting for any of the associated qualitative benefits, automated patch management will provide an ROI of approximately 450%, essentially paying for itself in less than three months. Review of Table 1 reveals that the largest contributions to these projected cost savings come from gains in the deployment step of the patch management process. These gains can be attributed in large part to the ability of client-side agents to minimize distribution/installation errors and to significantly facilitate any required troubleshooting. It is also important to recognize that while deployment related tasks are responsible for the greatest degree of savings, they are not the only ones that have an impact. In fact, as can be seen in the table, modest yet still significant gains are made in each of the other steps of the patch management Page - 3

5 process as well. Particularly telling is that even these smaller gains alone are sufficient to yield an annual reduction of 940 hours of labor, resulting in savings ($47,000) that is more than twice the cost of the patch management solution ($20,300). Again, a significant portion of the benefit can be attributed to the client agents. They automate both the pre-deployment task of establishing patch applicability as well as the post-deployment task of periodically validating that each patch remains properly installed. Extending beyond the patch management process, they can also facilitate inventory management objectives by identifying the software and hardware components residing on all managed systems. Mileage Will Vary As noted earlier, the cost analysis model and resulting savings projections of Table 1 are based on a wealth of experiential data. Nonetheless, it is appropriate to acknowledge that a number of factors can impact the real-world outcome for any given organization. Some of the more significant ones include: Size of organization; Degree of centralization/de-centralization; Level of administrator expertise; Diversity of operating systems; Diversity of application portfolio; Complexity of system configurations; and, Enterprise policies and procedures In addition, the patch management product that is selected can be another potentially significant factor. By no means are they all created equal. For example, unlike PatchLink Update, not all of them will have flexible system inventory capabilities, a streamlined patch deployment wizard, and assessment and validation services that are based on patented Patch Fingerprinting Technology. Nor will they all exhibit the advantages attributed to an agent-based architecture. For assistance selecting a best-of-breed automated patch management solution, readers are referred to the separately published whitepaper The Top 10 Requirements for Enterprise Patch and Vulnerability Management 1 Summary In this day and age of vulnerability proliferation and fast-following threats, automated patch management is an intuitively appealing solution. The qualitative benefits alone can often be quite compelling, with better (i.e., more accurate and potentially quicker) patching leading to an overall reduction in risk as a result of incurring fewer successful attacks. In addition, for organizations seeking more concrete evidence, it can fortunately be found in the form of quantifiable cost savings. Specifically, it is expected that an enterprise patch management solution featuring a high degree of automation will reduce the annual cost to patch a single computer from $222 to $40, representing an annual savings of over $180,000 for an organization with 1000 workstations. Footnotes: 1. The Top 10 Requirements for Enterprise Patch and Vulnerability Management is accessible at Page - 4

6 Figure 2: Elements of A Typical Patch Management Process Research involves identifying new vulnerabilities and patches that are applicable to the organization. Although straightforward, this task can be time consuming if accomplished manual. An automated approach can save the effort of sifting through a plethora of vendor and relevant security websites, press releases, and notifications. Analysis begins by establishing the general extent to which a given patch is applicable to the organization approximately how many systems are affected and what roles/services/applications are they supporting. Inventorying capabilities of an automated solution can facilitate these sub-tasks. This information is then combined with other factors (e.g., severity of the vulnerability, presence of an associated threat, business criticality of affected systems, and availability of other mitigating controls) in the highly manual task of analyzing and deciding whether the given patch should in fact be deployed. Indeed, another unfortunate yet all-too-real consideration that must also be factored in is the potential that any given patch will have negative repercussions on business operations (e.g., by causing system crashes, or even by introducing additional vulnerabilities). This will often lead to blanket policies, such as for critical servers, only apply patches associated with critical vulnerabilities. Testing involves applying each patch (typically individually) to a small subset of each type/build of computer that is affected and then monitoring them for any adverse side effects while the systems and their applications are Page - 5

7 exercised. While the first part of this step can be accelerated by an automated solution, there is minimal opportunity to improve the second part. Preparation starts with the highly manual effort of deciding on the particulars of how to deploy a patch, or more likely, a package of several patches. This entails answering questions such as: Which machines should be excluded? How will reboots be handled? Will the rollout be phased and, if so, how? What are the timing details (e.g., deadlines, maintenance windows)? It also involves collecting the patches themselves, and finally scripting or otherwise configuring the details of the deployment plan into an appropriate tool. Deployment of a patch package and any subsequent troubleshooting that is required can be aided significantly by an automated system, particularly one that is agent-based. In contrast, a manual approach will typically involve directly administering patches to a select subset of machines, as well as a higher failure rate for remote, script-based installations with both cases requiring a physical visit to the computers in question. Monitoring involves reporting on patch deployment and status (e.g., for compliance purposes) and then validating that all of the patches remain properly installed. Validation should also be repeated on periodic basis, since it is well established that approximately 20% of all systems will become unpatched over the course of a year (e.g., due to the installation of old versions of components, such as DLLs, by new patches, applications, or system rebuilds). In any event, both of these tasks can be challenging if done manually, requiring generation of custom signatures, scanning scripts, and reporting mechanisms. Page - 6

8 Table 1: Cost Comparison of Manual and Automated Patch Management Variables & Assumptions Notes Number of computers 1000 Classes of computers 2 Applicable patches per year 320 Annual Average for Microsoft *2 to account for other apps & systems Install rate 75% One per month plus 2 out-of-phase cycles to account for emergencies Install cycles (i.e., 14 rollouts)/yr Hourly rate ($'s) 50 Workdays/yr 250 Install failure rate, manual 15% Scripts don t work properly, glitches due to custom images, etc. Install failure rate, 1% automated Local install rate, manual 15% Pre-emptively decide to patch locally Local install rate, automated 0% Patch Management Process Task Task Units Hours per Task Unit Annual Labor (Hours) (i.e. frequency) Manual Automated Manual Automated Research Identify available patches per workday Analysis Establish scope of per patch applicability Determine whether to install per patch Testing per class/rollout Install in test environment Establish impact Preparation per class/rollout Determine distribution plan Compile patches Script/Configure plan detail Deployment per computer/rollout Local installs in production Troubleshoot failures Monitoring Reporting per rollout Validate installation per month Total Page - 7

9 Summary of Costs Manual Automated Notes Patch Process $222,350 $19,604 Patch Management Software $0 $18,000 Patch Management Hardware $0 $800 annual cost = one time cost divided by 3 years Patch Management Training $0 $250 annual cost = one time cost divided by 3 years Patch Management Installation $0 $400 annual cost = one time cost divided by 3 years Annual Maintenance $0 $480 20% of one-time hardware costs Total Annual Costs $223,350 $39,534 Total Annual Cost Savings $182,816 Page - 8

10 ABOUT THE AUTHOR Mark Bouchard, CISSP, is the founder of Missing Link Security Services, LLC, a consulting firm specializing in information security and risk management strategies. A former META Group analyst, Mark has assessed and projected the business and technology trends pertaining to a wide range of information security topics for nearly 10 years. He is passionate about helping enterprises address their information security challenges. During his career he has assisted hundreds of organizations world-wide with everything from strategic initiatives (e.g., creating 5-year security plans and over-arching security architectures) to tactical decisions involving the justification, selection, acquisition, implementation and operation of their security and privacy solutions. Dennis Roberson is Regional Director for the Mid-Atlantic for PatchLink Corporation. Page - 9

11 PatchLink Corporation Scottsdale, AZ Page - 10

Automated Patch Management: Impressive Return on Investment

Automated Patch Management: Impressive Return on Investment Business White Paper ZENworks Patch Management Automated Patch Management: Impressive Return on Investment Table of Contents page The Benefits of Automated Patch Management...2 Cost Benefits Analysis...2

More information

The Top 10 Requirements for Effective Enterprise Patch and Vulnerability Management. White Paper April 2006

The Top 10 Requirements for Effective Enterprise Patch and Vulnerability Management. White Paper April 2006 The Top 10 Requirements for Effective Enterprise Patch and Vulnerability Management White Paper April 2006 Keeping up with the steady flow of new patches being released for both platforms and applications

More information

PatchLink Update and Microsoft Systems Management Server 2003

PatchLink Update and Microsoft Systems Management Server 2003 White Paper July 2006 PatchLink Update and Microsoft Systems Management Server 2003 A C o m p l e m e n t a r y C o m b i n a t i o n f o r E ff e c t i v e P a t c h a n d S y s t e m s M a n a g e m

More information

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006 How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor

More information

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services

More information

Quantifying ROI: Building the Business Case for IT and Software Asset Management

Quantifying ROI: Building the Business Case for IT and Software Asset Management Quantifying ROI: Building the Business Case for IT and Software Asset Management Benefits of IT and Software Asset Management In today s increasingly competitive business environment, companies are realizing

More information

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint

More information

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING GENERATING VALUE WITH CONTINUOUS SECURITY TESTING AND MEASUREMENT A Spire Research Report Sponsored by Core Security Technologies 2010-2011 Spire Security, LLC. All rights reserved. The Value of Continuous

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

Justifying a System Monitoring Solution. A White Paper

Justifying a System Monitoring Solution. A White Paper Justifying a System Monitoring Solution A White Paper Abstract Justifying the purchase and implementation of a system monitoring solution can be difficult, since IT department software purchases are faced

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications

WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications WhiteHat Security White Paper Evaluating the Total Cost of Ownership for Protecting Web Applications WhiteHat Security October 2013 Introduction Over the past few years, both the sophistication of IT security

More information

understanding total cost of

understanding total cost of understanding total cost of for IP telephony solutions Position Paper A study from an independent research and consulting group reveals that a customer deploying a Nortel Networks IP telephony solution

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Management Solution. Key Criteria for Maximizing Value and Reducing Risk. Author: Mark Bouchard WHITE PAPER

Management Solution. Key Criteria for Maximizing Value and Reducing Risk. Author: Mark Bouchard WHITE PAPER WHITE PAPER Demand More from Your Log Management Solution Key Criteria for Maximizing Value and Reducing Risk Author: Mark Bouchard 2009 AimPoint Group, LLC. All rights reserved. Introduction Every IT

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Organizations that are standardizing today are enjoying lower management costs, better uptime. INTRODUCTION

Organizations that are standardizing today are enjoying lower management costs, better uptime. INTRODUCTION WHITEPAPER STANDARDIZED OPERATING ENVIRONMENTS FOR I.T. EFFICIENCY Boost productivity, increase uptime, and enhance business agility by standardizing your IT environment INTRODUCTION Organizations that

More information

Enterprise Job Scheduling: How Your Organization Can Benefit from Automation

Enterprise Job Scheduling: How Your Organization Can Benefit from Automation WHITE PAPER Enterprise Job Scheduling: How Your Organization Can Benefit from Automation By Pat Cameron Introduction Today's companies need automation solutions to attain the high levels of availability,

More information

Making the Business Case for IT Asset Management

Making the Business Case for IT Asset Management 1 The business case for IT Asset Management Making the Business Case for IT Asset Management Executive Summary IT Asset Management (ITAM) is an important business discipline that provides insight into

More information

Service and Support as a Business

Service and Support as a Business KPI s that Tell the Big Picture By Jeff Rumburg Managing Partner at: Introduction Most IT professionals are familiar with the operational metrics of service and support. KPI s such cost per ticket, first

More information

CA Vulnerability Manager r8.3

CA Vulnerability Manager r8.3 PRODUCT BRIEF: CA VULNERABILITY MANAGER CA Vulnerability Manager r8.3 CA VULNERABILITY MANAGER PROTECTS ENTERPRISE SYSTEMS AND BUSINESS OPERATIONS BY IDENTIFYING VULNERABILITIES, LINKING THEM TO CRITICAL

More information

Implementing Hybrid Cloud at Microsoft

Implementing Hybrid Cloud at Microsoft Implementing Hybrid Cloud at Microsoft Published September 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed as reference documentation

More information

The Massachusetts Open Cloud (MOC)

The Massachusetts Open Cloud (MOC) The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

Realizing the Benefits of Vulnerability Management in the Cloud

Realizing the Benefits of Vulnerability Management in the Cloud Realizing the Benefits of Vulnerability Management in the Cloud April 2011 Gordon MacKay CTO, Digital Defense, Inc. Introduction I would like to start out this whitepaper with a short story. One day earlier

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

Information and Communication Technology. Patch Management Policy

Information and Communication Technology. Patch Management Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Taking Information Security Risk Management Beyond Smoke & Mirrors

Taking Information Security Risk Management Beyond Smoke & Mirrors Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:

More information

Captaining datacenter security: putting you at the helm

Captaining datacenter security: putting you at the helm Captaining datacenter security: putting you at the helm 2 Introduction Running a datacenter involves a plethora of complex tasks, of which security is just one. But the security of virtual environments

More information

Advanced Remote Monitoring: Managing Today s Pace of Change

Advanced Remote Monitoring: Managing Today s Pace of Change Advanced Remote Monitoring: Managing Today s Pace of Change RMM solutions enable an organization to reduce the risk of system outages and guard against the impact of unauthorized or malicious uses of technology,

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Challenges Facing Today s Data s Centers

Challenges Facing Today s Data s Centers Challenges Facing Today s Data s Centers Contents Challenges facing today s Data Centers... 3 Top Factors Affecting Data Center Efficiency... 3 Limited Capital... 3 Application of More Building Blocks

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

See all, manage all is the new mantra at the corporate workplace today.

See all, manage all is the new mantra at the corporate workplace today. See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

How To Manage A Patch Management Program

How To Manage A Patch Management Program Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.

More information

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+ Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+ Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN,

More information

IT and Software Asset Management: A Key to Reducing Costs

IT and Software Asset Management: A Key to Reducing Costs W H I T E P A P E R IT and Software Asset Management: A Key to Reducing Costs Introduction While most businesses understand the importance of managing physical and financial assets and are experts at maximizing

More information

Lumension Guide to Patch Management Best Practices

Lumension Guide to Patch Management Best Practices Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security

More information

Going Thoroughly Virtual

Going Thoroughly Virtual Going Thoroughly Virtual By using virtualization throughout your clients entire IT infrastructure from servers to desktops and applications to storage you can deliver greater levels of agility, mobility,

More information

WHITEPAPER: The advantages of system automation tools in remote management systems

WHITEPAPER: The advantages of system automation tools in remote management systems WHITEPAPER: The advantages of system automation tools in remote management systems Table of Contents 1. Introduction 2. General benefits of system automation tools 3. Managed anti-virus software 4. Managed

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Audit Report Management of Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 Department

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Patch and Vulnerability Management Program

Patch and Vulnerability Management Program Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent

More information

Virtual Patching: a Compelling Cost Savings Strategy

Virtual Patching: a Compelling Cost Savings Strategy Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day

More information

Four Factors Not to Overlook When Trying to Save on Security

Four Factors Not to Overlook When Trying to Save on Security WHITE PAPER Four Factors Not to Overlook When Trying to Save on Security Author: Mark Bouchard Executive Summary Unrelenting pressure to do more with less has CIOs worldwide aggressively pursuing cost-saving

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

Security Patch Management

Security Patch Management The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

CITY UNIVERSITY OF HONG KONG Change Management Standard

CITY UNIVERSITY OF HONG KONG Change Management Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September 2015) PUBLIC Date of Issue:

More information

Consequences of Poorly Performing Software Systems

Consequences of Poorly Performing Software Systems Consequences of Poorly Performing Software Systems COLLABORATIVE WHITEPAPER SERIES Poorly performing software systems can have significant consequences to an organization, well beyond the costs of fixing

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late. BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015

HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Release Overview Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Highlights HEAT Discovery Integration Patch Management Enhancements HEAT PatchLink Integration HEAT

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Reduce IT Costs by Simplifying and Improving Data Center Operations Management

Reduce IT Costs by Simplifying and Improving Data Center Operations Management Thought Leadership white paper Reduce IT Costs by Simplifying and Improving Data Center Operations Management By John McKenny, Vice President of Worldwide Marketing for Mainframe Service Management, BMC

More information

Appendix V Risk Management Plan Template

Appendix V Risk Management Plan Template Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions

More information

Securing the Microsoft Environment Using Desktop Patch Management

Securing the Microsoft Environment Using Desktop Patch Management Securing the Microsoft Environment Using Desktop Patch Management Published: February 2009 In an enterprise organization such as Microsoft, it's mission critical to maintain a secure environment by keeping

More information

Reducing the Complexity of Virtualization for Small and Midsized Businesses

Reducing the Complexity of Virtualization for Small and Midsized Businesses Reducing the Complexity of Virtualization for Small and Midsized Businesses Deploying an SMB-Specific SaaS Solution to Simplify Virtualization and Increase IT Productivity WHITE PAPER Executive Summary

More information

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success : Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley Akorri

The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley Akorri The BusinessCase forvirtualization Management: A New ApproachtoMeetingITGoals ByRichCorley Akorri July2009 The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Three Ways to Secure Virtual Applications

Three Ways to Secure Virtual Applications WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Integrated Threat & Security Management.

Integrated Threat & Security Management. Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate

More information

Enterprise software risk reduction

Enterprise software risk reduction Enterprise software risk reduction Danny Lieberman dannyl@software.co.il www.software.co.il August 2006 ABSTRACT Operational risk is the risk of loss resulting from inadequate or failed internal processes,

More information

Accounts Payable Imaging & Workflow Automation. In-House Systems vs. Software-as-a-Service Solutions. Cost & Risk Analysis

Accounts Payable Imaging & Workflow Automation. In-House Systems vs. Software-as-a-Service Solutions. Cost & Risk Analysis In-House Systems vs. Software-as-a-Service Solutions Cost & Risk Analysis What is Imaging & Workflow Automation? Imaging and Workflow Automation (IWA) solutions streamline the invoice receipt-to-pay cycle

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

The Power to Take Control of Software Assets

The Power to Take Control of Software Assets The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets The Benefits of SAM: Building the case for Conducting a SAM Assessment and Implementing a

More information

ENTERPRISE IT SERVICE MANAGEMENT BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR. Ocotber 2012

ENTERPRISE IT SERVICE MANAGEMENT BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR. Ocotber 2012 S T A T E O F C O N N E C T I C U T BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR ENTERPRISE IT SERVICE MANAGEMENT (Featuring Numara Footprints Service and Asset Management)

More information

Stronger than Firewalls And Cheaper Too

Stronger than Firewalls And Cheaper Too Stronger than Firewalls And Cheaper Too Andrew Ginter Director of Industrial Security Waterfall Security Solutions 2012 Emerging Threat: Low Tech, Targeted Attacks Night Dragon, Shady RAT, Anonymous Trick

More information

White Paper The Dynamic Nature of Virtualization Security

White Paper The Dynamic Nature of Virtualization Security White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

SaaS Model - A Solution For Clean Up Garbage Stamps

SaaS Model - A Solution For Clean Up Garbage Stamps APPLYING THE SOFTWARE AS A SERVICE MODEL TO AIR EMISSIONS INVENTORY COLLECTION Dan Derby MACTEC Engineering and Consulting, Inc. 5001 South Miami Blvd #300, Research Triangle Park, North Carolina, 27709

More information

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity.

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity. Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July

More information